DNS: BIND Dynamic Update Denial of Service

This signature detects attempts to exploit a known vulnerability against DNS BIND. A successful attack can result in a denial-of-service condition.

Extended Description

ISC BIND is prone to a remote denial-of-service vulnerability because the software fails to properly handle specially crafted dynamic update requests. Successfully exploiting this issue allows remote attackers to crash affected DNS servers, denying further service to legitimate users. Other attacks are also possible. Versions prior to BIND 9.4.3-P3, 9.5.1-P3, and 9.6.1-P3 are vulnerable.

Affected Products

Sun opensolaris

Short Name
DNS:DYNAMICUPDATE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
DNS
Keywords
BIND CVE-2009-0696 Denial Dynamic Service Update bid:35848 of
Release Date
07/30/2009
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3725
False Positive
Unknown
Vendors

Red_hat

Sco

Suse

Apple

Gentoo

Sun

Hp

Turbolinux

Avaya

Novell

Freebsd

Mandriva

Rpath

Pardus

Slackware

Ubuntu

Isc

Netbsd

Debian

Vmware

Ibm

CVSS Score

4.3

Found a potential security threat?